Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DNS
biblio
Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers
Submitted by grigby1 on Fri, 02/24/2023 - 4:32pm
internet
Length measurement
ECS
Content distribution networks
Behavioral sciences
IPv6
Policy Based Governance
DNS
composability
collaboration
privacy
Correlation
Resiliency
resilience
Metrics
pubcrawl
IP networks
security
biblio
A Trust Based DNS System to Prevent Eclipse Attack on Blockchain Networks
Submitted by grigby1 on Mon, 02/13/2023 - 2:03pm
security
Servers
blockchain
Peer-to-peer computing
pubcrawl
Analytical models
Scalability
DNS
trust
Scalable Security
blockchains
Broadcasting
Accesslists
Eclipse Attacks
normalization
biblio
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone
Submitted by grigby1 on Thu, 10/13/2022 - 11:16am
security
Monitoring
Servers
pubcrawl
Human behavior
DNS
Phishing
unsolicited e-mail
Electronic mail
Uniform resource locators
overload mitigation
phishing URL
Response Policy Zone
route detouring
RPZ
URL Phishing attack
biblio
A Multi-Layered Defense Approach to Safeguard Against Ransomware
Submitted by aekwall on Thu, 07/14/2022 - 3:20pm
Ransomware
Web Filtering
layered defense
email security
antivirus
Antimalware
DNS
pubcrawl
cyber security
malware
security
composability
Resiliency
Metrics
Conferences
Computer crime
tools
Medical services
Training
biblio
Enhanced Vulnerability Detection in SCADA Systems using Hyper-Parameter-Tuned Ensemble Learning
Submitted by aekwall on Tue, 05/10/2022 - 12:51pm
network security
SCADA
network security detection
Hyper-parameter-tune
Ensemble Learning
DoH
DNS
Benign
vulnerability detection
Vulnerability
information and communication technology
simulation
SCADA systems
Compositionality
machine learning
Human behavior
Resiliency
Metrics
pubcrawl
Reliability
Big Data
biblio
On the Soundness of Infrastructure Adversaries
Submitted by grigby1 on Thu, 02/24/2022 - 11:31am
policy-based collaboration
tools
Security Risk Estimation
security economics
Safety
risk management
pubcrawl
Protocols
protocol verification
privacy
Internet-scale Computing Security
Planning
internet
DNSsec
DNS
Computational modeling
Compositionality
composability
collaboration
Analytical models
biblio
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages
Submitted by grigby1 on Mon, 01/31/2022 - 4:39pm
Browsers
web defacement
malicious modification
malicious browser extensions
websites
Telecommunications
Web Browser Security
Web pages
Phishing
Compositionality
security
domain name system
security policies
DNS
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Cyber-security research by ISPs: A NetFlow and DNS Anonymization Policy
Submitted by grigby1 on Thu, 04/29/2021 - 1:16pm
anonymization
Cyber-security
DNS
IPFIX
ISP
NetFlow
policy-based governance
privacy
pubcrawl
security policies
biblio
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress
Submitted by grigby1 on Wed, 11/04/2020 - 1:13pm
pubcrawl
GeoIP related features
Human behavior
internet
IP networks
Kaminsky attack
learning (artificial intelligence)
machine learning
machine learning techniques
feature extraction
resilience
Resiliency
Scalability
security of data
Servers
standard DNS protocols
time related features
Training
detection method
authoritative DNS server
cache poisoning attack
cache storage
cached DNS data
compromised authoritative DNS servers
Computer crime
computer network security
Databases
AI Poisoning
DNS
DNS based domain name resolution
DNS cache poisoning attacks
DNS cache servers
DNS packet
DNS response packets
DNS security extensions
biblio
A Protocol Independent Approach in Network Covert Channel Detection
Submitted by grigby1 on Thu, 07/16/2020 - 11:18am
supervised learning
network traffic dataset
protocol independent approach
protocol-independent approach
Protocols
pubcrawl
resilience
Resiliency
Scalability
stealth tunnels
network storage covert channel detection
supervised machine learning technique
support vector machine (SVM)
Support vector machines
TCP
TCP protocols
telecommunication computing
telecommunication traffic
wireless channels
IP networks
Compositionality
covert channel communication
covert channels
Decision Tree
DNS
DNS protocols
feature extraction
generic detection model
composability
IP protocols
IPv4
k-nearest neighbors
Kernel
logistic regression
Logistics
machine learning
network covert channel
1
2
3
next ›
last »